CVE-2025-40568
BaseFortify
Publication date: 2025-06-10
Last updated on: 2026-01-13
Assigner: Siemens AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-863 | The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the web interface of certain Siemens Industrial Communication Devices running SINEC OS versions prior to V3.2. It is an incorrect authorization check in the internal session termination functionality, which allows an authenticated remote attacker with a 'guest' role to terminate legitimate users' sessions.
How can this vulnerability impact me? :
An attacker with 'guest' role access can remotely terminate sessions of legitimate users, potentially disrupting normal device management and operations by forcing users to lose their active sessions unexpectedly.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability affects Siemens Industrial Communication Devices running SINEC OS versions prior to V3.2. Detection involves identifying devices with affected firmware versions. Siemens recommends verifying the device firmware version to confirm if it is less than V3.2. Specific commands are not provided in the resources, but checking device firmware versions via device management interfaces or network scanning tools that identify device types and firmware versions is advised. [1]
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update all affected Siemens Industrial Communication Devices to SINEC OS version 3.2 or later. Additionally, protect network access to these devices and configure the operational environment according to Siemens' Industrial Security guidelines to reduce exposure. [1]